0% found this document useful (0 votes)
11 views9 pages

Hou at Al New Algorithms For Computing The Time-To-Collision in Freeway Traffic Simulation Models

Uploaded by

m50b25e30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views9 pages

Hou at Al New Algorithms For Computing The Time-To-Collision in Freeway Traffic Simulation Models

Uploaded by

m50b25e30
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Hindawi Publishing Corporation

Computational Intelligence and Neuroscience


Volume 2014, Article ID 761047, 8 pages
http://dx.doi.org/10.1155/2014/761047

Research Article
New Algorithms for Computing the Time-to-Collision in
Freeway Traffic Simulation Models

Jia Hou,1 George F. List,2 and Xiucheng Guo1


1
School of Transportation, Southeast University, No. 2 Sipailou, Nanjing 210096, China
2
Department of Civil, Construction, and Environmental Engineering, NCSU, Raleigh, NC 27695, USA

Correspondence should be addressed to Jia Hou; [email protected]

Received 3 October 2014; Accepted 4 December 2014; Published 31 December 2014

Academic Editor: Yongjun Shen

Copyright © 2014 Jia Hou et al. This is an open access article distributed under the Creative Commons Attribution License, which
permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Ways to estimate the time-to-collision are explored. In the context of traffic simulation models, classical lane-based notions of
vehicle location are relaxed and new, fast, and efficient algorithms are examined. With trajectory conflicts being the main focus,
computational procedures are explored which use a two-dimensional coordinate system to track the vehicle trajectories and assess
conflicts. Vector-based kinematic variables are used to support the calculations. Algorithms based on boxes, circles, and ellipses
are considered. Their performance is evaluated in the context of computational complexity and solution time. Results from these
analyses suggest promise for effective and efficient analyses. A combined computation process is found to be very effective.

1. Introduction analyzed and compared. This leads to a result that one of the
algorithms is recommended as the primary methodology to
The time-to-collision (TTC) has often been used as a risk apply in traffic simulation models.
assessment metric for traffic safety analyses. In freeway simu-
lation models, TTC is often a critical element of a driver’s tra- 2. Literature Review
jectory management decision-making process. TTC assesses
the interaction intensity among vehicles. However, comput- The idea of computing a time-to-collision (TTC) was first
ing the TTC is not trivial. Projections of future interactions suggested by Hayward [1]. He defined it as “the time required
among vehicles involve creating predicted trajectories for for two vehicles to collide if they continue at their present
the subject vehicle as well as all other vehicles with which speed and on the same path.” Hydén suggested that lower
interactions might occur in order to see if collisions might TTC values correspond to higher conflict severities [2].
occur. The objective of this paper is to consider and evaluate Although this point has been argued in the safety assessment
algorithms that could be used to compute this new TTC in literature, it seems clear that lower TTC values correspond to
microsimulation based models. The algorithm must be as effi- a higher probability of collision [3, 4]. Hence, TTC is gener-
cient since the speed of the TTC computation will influence ally perceived to be a primary and efficient measure in traffic
the capacity of the simulation model. In contrast with existing safety assessment especially in assessing conflicts. In micro-
research, the algorithms discussed here address the problem scopic simulation, TTC is one of the most common safety
from a 2D continuous perspective. Given that focus, several surrogate assessment measures employed. In 2003, FHWA
approaches are examined for computing the TTC in a fast released a report that introduced the use of traffic simulation
and accurate manner. The results of these investigations are models to obtain surrogate safety measures [5]. In that doc-
presented and one procedure is recommended for use. ument, computational algorithms for calculating surrogate
Following this introduction, the next section reviews safety measures for different conflict types were described,
related research. The third part illustrates the problem of and example diagrams were provided to illustrate the calcula-
interest and the fourth presents several computational algo- tions graphically. In 2008, FHWA combined traffic simulation
rithms that are described. After that, the algorithms are and automated traffic conflict analysis to develop a software
2 Computational Intelligence and Neuroscience

Trajectory management model for a single vehicle at every time step


Subject vehicle’s state Adjusted Reaction No
Road model acceleration model
Desired
The state of surrounding vehicles Destination acceleration TTC set
TTC algorithm Acceptable
attraction

Infrastructure data Traffic control Yes

Acceleration vector
after reaction time t󳰀

Figure 1: The TTC algorithm in the context of trajectory management.

utility referred to as a surrogate safety assessment model 3. TTC as a Trajectory Management Aid
(SSAM) [6].
Besides being a safety indicator, the use of TTC as a cue 3.1. The Context of the Simulation System. In the new algo-
for decision-making in traffic has been suggested by several rithms presented here, the vehicles are treated as being in a
studies. For example, Horst found that both the decision to two-dimension plane. Each one is represented by a rectangle
start braking and the control of the braking process itself located at a specific spot in the 𝑋-𝑌 plane. Each has a velocity
can be based on TTC-related information [7]. By measuring and an acceleration, both of which are vectors.
drivers’ last second braking and steering while approaching a There are no “lead vehicles” or “following vehicles.” Each
surrogate target lead vehicle, a model is built which indicates “subject” vehicle interacts with its nearby vehicles. The subject
that the drivers’ response is according to an inverse time-to- vehicle’s actions are consistent with three rules: (i) follow
collision threshold that decreases linearly with driver speed the vehicles in front, (ii) avoid collisions, and (iii) scale the
[8]. intensity of the actions taken based on the numerical value of
TTC will not be simply replaced by headway since field the TTC. That is, employ more intense actions for larger TTC
data showed that headway and TTC are independent of each values and vice versa.
other [9]. In the case of the TTC evaluations commonly The TTC is computed every time step for each vehicle
performed today, vehicles are assumed to stay in the same pair that are close enough to each other that a TTC value
lane until their positions overlap. As a result, the TTC calcu- is meaningful. The new coordinates of the “subject” vehicle
lations are one-dimensional and the kinematic variables are are computed based on its old location, new speed vector,
scalars instead of vectors. The time-to-collision of a vehicle- and new acceleration vector. Its new speed vector is similarly
driver combination 𝑖 at instant 𝑡 with respect to a leading computed from its old speed and new acceleration vector.
vehicle 𝑖 − 1 on the same path is calculated with Acceleration vectors are determined through an analysis of
the desired trajectory, road geometry, traffic controls (e.g.,
𝑋𝑖 (𝑡) − 𝑋𝑖−1 (𝑡) − 𝑙𝑖 stop signs, traffic signals, and speed limits), and proximity
TTC𝑖 = ∀𝑋̇ 𝑖 (𝑡) > 𝑋̇ 𝑖−1 (𝑡) , (1) to neighboring vehicles. Acceleration is deemed acceptable
𝑋̇ 𝑖 (𝑡) − 𝑋̇ 𝑖−1 (𝑡)
if it will not lead to any collisions. This process is illustrated
in Figure 1. It places those computations into the broader
where 𝑋̇ 𝑖 denotes the speed, 𝑋 the position, and 𝑙 the vehicle trajectory management context. The “TTC algorithm” box
length [10]. From (1) it can be seen that the TTC is usually highlights the materials being discussed in this paper.
computed for a specific path. Laureshyn et al. indicated that
TTC could make continuous description during the road
users’ encounter process and provided a procedure for calcu- 3.2. A New Definition of TTC. The intent here is to compute
lating TTC for one vehicle’s side and another’s corner point a TTC that can influence the reaction maneuvers of subject
[11]. vehicles. That is, the focus is not just on computing an
Unfortunately, these computational procedures do not “expected or actual time-to-collision.” Rather, it is to measure
align well with the way vehicles move. They do not jump the imminent danger faced by the driver (the possibility that
from one lane to another. Moreover, additional vehicles are an accident will happen) if he/she continues on the current
considered besides the one in front. If the TTC is to be used trajectory. The idea presented here is to define the TTC as
as a decision-making aid, it should address situations where “the time it will take a subject vehicle to collide with another
vehicles are in the process of changing lanes. Moreover, accel- vehicle in its immediate vicinity if the present trajectories
eration should be included not just location and speed. This continue to be followed.” This definition is different in two
paper presents a new TTC definition as well as algorithms respects from the one currently in use: (i) acceleration is taken
based on that definition with these thoughts in mind. into consideration and (ii) the environmental objects include
Computational Intelligence and Neuroscience 3

vehicles in other lanes as well as those in the same lane or the


same path with subject vehicle. These differences allow the
TTC to account for lane-changing maneuvers and to allow
vehicles to follow trajectories that are not necessarily con-
strained by lane-based concepts (e.g., especially important for
motorbikes, bicycles, and weaving vehicles).
Conflict

3.3. Vehicle Locations and Buffer Areas. In the ideas presented


here, all vehicles have an 𝑋-𝑌 location in a 2D plane.
This location is their centroid. Longitudinal motion is along
the facility. Lateral motion is perpendicular. The vehicle’s
speed and acceleration are two-dimensional vectors and they
operate from the centroid. The orientation of the rectangle
and the speed and acceleration vectors need not be aligned.
Vehicles are represented by rectangles with specific
lengths and widths. This contrasts with many of the exist-
ing traffic simulation models where vehicle dimensions are
Buffer area
largely overlooked. In some cases, this is acceptable; in others
it is not. In some circumstances (e.g., intersections), the
relative speed is large enough that vehicles can be represented Subject vehicle
as particles. But on facilities like freeways, if the geometric
details are ignored, errors can arise. In lane-changing maneu-
vers, for example, the necessary space for a vehicle of certain
size is much larger than a simplified moving spot. Environmental vehicle
Technically, collisions occur if these rectangles overlap.
Thus the TTC computational problem could be defined as a
two-step process. First, determine interactions with nearby Figure 2: The demonstration of the buffer area.
vehicles: given the subject vehicle’s location, speed, and accel-
eration, how long will it be until its rectangular area overlaps
that of another nearby vehicle. Second, find the minimum 3.4. The Input and Output Issues. Before calculating the TTC,
of these times. That value is the TTC. vehicle pairs which are close together need to be picked from
In the context of this analysis, it is useful to introduce the the entire vehicle population. Although proximity does not
idea of a buffer area around each vehicle, that is, an area that change dramatically from one time step to the next, this
the vehicle occupies that encompasses not only its rectangular assessment needs to be repeated each time step. Effectively, a
footprint, but a larger safety area. This idea is illustrated in “potential conflicts” set exists for every vehicle and those sets
Figure 2. The subject vehicle’s buffer area is the green part need to be kept current as time unfolds. This process is based
around it. on the data structure of the simulation system which is not
The motivation for the buffer derives from the fact that this paper’s issue. It is assumed that the set is given for every
drivers like to keep a certain safety distance from other vehi- time step and we directly discuss the TTC computation part.
cles. Drivers perceive invasion of this area by other vehicles In the context of this paper, the intent of computing the
as a conflict. In other words, the space range which the driver TTC is to ascertain whether the currently planned trajectory
tries to protect from other vehicles is not only the vehicle is safe or not. If not, a safety-related adjustment will need to
itself but also the buffer area. be made. For example, to avoid collisions with other vehicles
Moreover, the buffer does not have the same dimensions including those on their own lane and others on the subject
in every direction. The distance forward is larger than the lane, the driver needs to judge whether the lane-changing
distances left or right or rear. The safety distance of the center acceleration will lead to conflicts with other vehicles or not.
spot is larger than that of those spots on the right or left part If a very short TTC value pertains with some vehicle, then
because it takes more time to avoid conflict with an obstacle the lateral movement is not acceptable. On the other hand, if
on the center point than that on the right or left part. Most the TTCs with all of the adjacent vehicles are satisfactory, the
maneuvers motivated by safety are going to result in keeping lane-changing maneuver can be perceived as safe and feasible.
a safety distance rather than direct physical contact. However, this is a decision that is made after the TTC
The extension of this buffer idea is to compute a TTC assessment has been performed. Hence, in this analysis,
which is consistent with these driver perceptions. That is, trajectory adjustment analysis is not considered although the
make the “time-to-collision” consistent with the “time-to- procedures described here can be used to determine what
conflict between the buffer areas.” adjustments would be appropriate.
The size of the buffer should be based on driver behavior In the TTC analyses that follow, the present or intended
as observed in natural studies or driving simulators. As our acceleration vector is assumed to be an input variable from
algorithm is for the behavior model, the geometric measure the state of the system data or other functions. And that
of the safety buffer should be covered in the algorithm. having been said, there are tests that pertain to the lateral
4 Computational Intelligence and Neuroscience

accelerations being employed in the TTC analysis. For exam-


ple, if the subject vehicle wants to change lanes then there Ri
should be acceleration in the lateral direction. If these tests
reveal logical inconsistencies, then adjustments need to be
made to the TTC analysis inputs before the assessment is
conducted.

4. Methodology
Discenter = Ri + Rj Rj
The key to the method is a simple, straightforward way to
determine when the “subject” vehicle will “touch” a “target”
vehicle. As the reader might expect, the geometric shapes
assumed for the two vehicles have a significant impact on the
complexity of and time required for the calculations. Even
though we assumed that the vehicles are basically rectangles
when projected to the plane, we need to deal with the buffer
areas in computing the TTC. Hence the shape used in the Figure 3: A collision based on circles as buffers.
analysis should not be the physical rectangle. It should be
larger or even a different shape.
Another reason to consider different shapes is that the real positive roots for the equation in the range of effective
geometric features of the shape will influence the complexity TTC values, the smallest value is the TTC. As can be seen,
of the algorithm. In the following text, four algorithms are the computation is straightforward and simple.
discussed based on different shapes.
4.2. Rectangle Algorithm. This algorithm treats both the sub-
4.1. Circle Algorithm. Circles are a valuable geometric shape ject vehicle and the target vehicles as rectangles. The rectangle
with which to experiment. Determining when two circles for the subject vehicle is larger than its own physical rectangle
touch is simply a matter of determining whether the distance to account for the buffer area. The target vehicle is repre-
between the circle centers is less than the sum of the radii. The sented by the rectangle of its own measure. When the two
problem is, the shape of the circles does not match well with rectangles overlap, a collision has occurred.
our notion of a buffer. But that limitation does not imply that In this case, it is not possible to solve a set of equations
the use of circles should be omitted. This could be a valuable directly to compute the TTC. Simulation must be used.
prescreening procedure. Hence, the algorithmic task is as follows: “given the orienta-
As shown in Figure 3, if the buffers are circles, then, when tion of two rectangles with certain speeds and accelerations,
the distance between the centers of two circles is equal to the move them from one time step to another, and get the time
sum of the two radii, the subject vehicle has touched the target when they overlap.”
vehicle. Fortunately, it is trivial to locate a pair of rectangles in
Mathematically, given the radius, position, and state of every time step of the simulation. A general polygon-clipping
motion for every vehicle (circle), the TTC is easy to obtain. algorithm can be used to perform the detection. As shown
The equation set is in Figure 4, one of the two rectangles is defined to be the
clipper and the other is the target. The edges of the clipper
1
[𝑥𝑖 + V𝑥𝑖 ⋅ TTC𝑖𝑗 + 𝑎𝑥𝑖 ⋅ TTC𝑖𝑗 2 are assumed to be vectors oriented in a clockwise direction.
2 Each directed edge of the clipper is used to cut the target
2
1 rectangle, retaining at each step the remaining piece of the
− (𝑥𝑗 + V𝑥𝑗 ⋅ TTC𝑖𝑗 + 𝑎𝑥𝑗 ⋅ TTC𝑖𝑗 2 )] target that is to the right of the clipping edge. This process
2
continues until all the edges of the clipper have been exam-
1
+ [𝑦𝑖 + V𝑦𝑖 ⋅ TTC𝑖𝑗 + 𝑎𝑦𝑖 ⋅ TTC𝑖𝑗 2 (2) ined. A collision exists if the target rectangle has a nonzero
2 area remaining.
2 As each edge of the clipper is examined, the size of the
1
− (𝑦𝑗 + V𝑦𝑗 ⋅ TTC𝑖𝑗 + 𝑎𝑦𝑗 ⋅ TTC𝑖𝑗 2 )] remaining area is tested. To determine if an endpoint is to the
2 right of the clipping vector, the cross product of that vector
2 and the vector from the starting point of the clipping vector
= (𝑟𝑖 + 𝑟𝑗 ) ,
to the endpoint is applied. If one of two adjacent points is on
where TTC𝑖𝑗 is the unknown value of TTC between the 𝑖th the left while the other is on the right, the intersection point
and 𝑗th vehicle, 𝑥𝑖 and 𝑦𝑖 are the coordinates, V𝑥𝑖 and V𝑦𝑖 of the clipping vector and the line segment defined by those
are speed components on 𝑋 and 𝑌 direction, 𝑎𝑥𝑖 and 𝑎𝑦𝑖 are two points remains as a new endpoint of the rest piece.
acceleration components on 𝑋 and 𝑌 direction of 𝑖th vehicle,
and 𝑟𝑖 is the radius of the circle standing for the 𝑖th vehicle. 4.3. Ellipse-Rectangle Algorithm. As shown in Figure 5, this
It is a quartic equation with one unknown TTC𝑖𝑗 . If there are option uses an ellipse to represent the subject vehicle and a
Computational Intelligence and Neuroscience 5

Buffer
area

The subject
Step 1 Step 2 vehicle

Some other
vehicle

Step 4 Step 3
Figure 5: The illustration for the ellipse-rectangle algorithm.

The clipping vector


The area remaining on the right
As an aside, when doing the computations, a coordination
Figure 4: The process of the rectangle clipping algorithm. transformation saves time. It pays to put the centroid of the
ellipse at the origin of the coordinate system and align the
axes with the orientation of the ellipse.
rectangle to represent the target vehicle. The ellipse around The next question to answer is this, “when do the ellipse
the subject vehicle is longer in the longitudinal direction and the rectangle overlap.” To identify the answer, the rela-
than it is in the lateral direction. This ensures that the safety tionship of line segments to the ellipse needs to be examined.
distance is longer in front and back than it is to the right or This is illustrated in Figure 6.
left. The process of identifying when the line segments
A preliminary step is to set the dimensions of the ellipse. intersect the ellipse involves the following steps, which are
The values depend on the safety spacing retained by drivers. executed for each of the four line segments that comprise the
Although there are papers talking about various types of rectangle for the neighboring vehicle.
safety distance or safety headways, for driving behavior this
kind of shielding area has been rarely researched. It is dif- Step 1. Divide the plane around the ellipse into 9 regions
ferent from the minimum headway which provides enough defined by the bounding box for the ellipse as illustrated
stopping distance and clear vision. It should be smaller and, in Figure 6(a). Assign an exclusive code to each region.
like the reaction time, varies among drivers and is difficult to Assign codes to the segment endpoints based on their relative
determine by general trajectory data. Moreover it might be locations.
affected by the traffic condition and the speed. The higher the
Step 2. By “bitwise-or” and “bitwise-and” computations for
speed is, the larger the safety spacing should be.
the two endpoints of each line segment, identify which of the
However, the details of the dimensions of this ellipsoidal
five conditions pertains to the spatial relationship between
buffer area are not the main focus of this paper. It is sufficient
the line and the ellipse: (i) both segment endpoints are inside
to assume that the characteristics of the ellipse can be related
the ellipse as 𝑙0 in Figure 6(b); (ii) both points are on the same
to the dimensions of the vehicle. Thus, without loss of
side of one edge of the bounding box like 𝑙1 ; (iii) one point
generality, we can set the major axis at 1.6 times the length of
is inside the ellipse while the other is outside as with 𝑙2 ; (iv)
the vehicle and the minor axis at 1.3 times the width. Then the
the two endpoints are on opposite sides of the ellipse as with
ellipse at every time step is defined by the following equation:
𝑙4 ; that is, one end is on the top while the other is on the
1 2 bottom or one is on the left while the other is on the right.
2
[(𝑥𝑖𝑡𝑗 − 𝑥𝑐𝑖𝑡𝑗 ) ⋅ cos 𝛼𝑖𝑡𝑗 + (𝑦𝑖𝑡𝑗 − 𝑦𝑐𝑖𝑡𝑗 ) ⋅ sin 𝛼𝑖𝑡𝑗 ] In this situation, there must be two intersection points: (v)
𝑎𝑖
conditions other than cases (i) to (iv), as with 𝑙5 or 𝑙6 . For con-
1 2
ditions (i), (iii), and (iv), the segment and ellipse overlap. For
+ 2
[(𝑦𝑖𝑡𝑗 − 𝑦𝑐𝑖𝑡𝑗 ) ⋅ cos 𝛼𝑖𝑡𝑗 − (𝑥𝑖𝑡𝑗 − 𝑥𝑐𝑖𝑡𝑗 ) ⋅ sin 𝛼𝑖𝑡𝑗 ]
𝑏𝑖 condition (ii), there is no overlap. If condition (v) pertains,
the algorithm moves to Step 3.
= 1,
(3) Step 3. Since the ellipse and the line segment are both defined
by equations, solve these equations simultaneously and see
where 𝑎𝑖 and 𝑏𝑖 are the major and minor semiaxis of the 𝑖th if a real-valued solution is identified that lies in between the
vehicle’s ellipse, 𝑥𝑐𝑖𝑡𝑗 and 𝑦𝑐𝑖𝑡𝑗 are the coordinates of centroid endpoints. If so, the line segment and the ellipse overlap.
at 𝑡𝑗 , 𝛼𝑖𝑡𝑗 is the angle of the vehicle’s longitudinal axis with the
positive direction of 𝑥-axis, and (𝑥𝑖𝑡𝑗 , 𝑦𝑖𝑡𝑗 ) is the coordination 4.4. Comparing and Combining the Procedures. The above
of any point on the ellipse. three algorithms all have advantages and disadvantages.
6 Computational Intelligence and Neuroscience

01001 01000 01010 l5

l3

00001 10000 00010 l1 l0 l2

00101 00100 00110 l6


l4

(a) Nine regions for the ellipse (b) Lines and the ellipse

Figure 6: Detection of the intersection between the ellipse-rectangle and a line segment.

Table 1: Comparison of the three algorithms. Circle algorithm with big


circles
Type of Buffer area Simulation
Accuracy
algorithm representation necessary
Circle Not good Not good No
If there is a No
Rectangle Fair Good Yes collision
Ellipse-rectangle Good Good Yes
TTCbigcir Yes

Circle algorithm with


Based on the performance of the three respects as approxima- small circles
tion of the buffer area, accuracy, and the demand of numerical
simulation, a comparison can be drawn between them. The
result is shown in Table 1. No Process ellipse-rectangle
If there is a
The circle algorithm is quick. No simulation is needed. collision algorithm from TTCbigcir
But the circles do not reflect the shape of the buffer in any TTCbigcir
significant way unless circles of two different sizes are used: TTCsmacir Yes
one longitudinally and one laterally. There can be situations Dichotomy search between No
If there is a
when the circles intersect on the lateral side if the vehicles are TTCbigcir and TTCsmacir by collision
in adjacent lanes. If a much smaller radius is used laterally, ellipse-rectangle algorithm
this drawback can be partly addressed. However, this can TTC
result in situations where the radius is too small and the TTC Yes
There is a collision TTC No collisions in the
is too large. after TTC near future
The ellipse-rectangle procedure is good at representing
the buffer area. Its accuracy is good, but simulation is needed Figure 7: The combined algorithm.
to compute the TTC.
The rectangle algorithm is fair at representing the buffer
area—areas outside the ellipse but within the buffer rectangle
are really outside the buffer zone. But its accuracy is good. As the ellipse-rectangle is the most rational and accurate
among the three it should be used to determine the exact
Simulation is necessary to obtain the TTC, but the clipping
value of TTC. Based on these ideas, the algorithm shown in
procedure makes it quick to determine at any given time step
Figure 7 was developed.
whether or not a collision has occurred.
The combined algorithm starts by using the big circle
Given the strengths and weaknesses of the three methods, algorithm. The idea is to use the circle algorithms to narrow
we experimented with combining them. For example, if we the time range of the simulation so that computation time can
start by using the circle procedure, no overlap arises in the be saved.
future time intervals of interest; then no possibility of a colli- Assume that the current time is 𝑡0 . If no overlap between
sion exists. Hence, analysis at a finer level of detail is unneces- the subject and target circles is identified beyond 𝑡0 , then
sary. Similarly, if we use a small circle based on the inscribed no collision is going to arise (highlighted at the bottom
circle of the original rectangle, if the two circles overlap, of Figure 7). If the big circle algorithm identifies a time of
there must be a collision. Moreover, the exact moment at overlap, it is designated as 𝑡0 + TTCbigcir .
which the collision occurred has to be in between the time If 𝑡0 + TTCbigcir is nonzero, then a small circle test ensues.
at which the big circles overlap and the time when the small Moreover, if an overlap is identified in this case, that time
circles first overlap. is denoted as 𝑡0 + TTCsmacir . If 𝑡0 + TTCsmacir is nonzero,
Computational Intelligence and Neuroscience 7

then there must be a collision between 𝑡0 + TTCbigcir and Table 2: Computation times for the example dataset.
𝑡0 +TTCsmacir . To find out the exact TTC, the ellipse-rectangle
Correlation coefficient
algorithm is employed.
Computation between inverse TTC
If a collision is predicted based on the big circle analysis, Algorithm type
time (sec) and reaction intensity
while none is predicted by the small circle one, simulation is 𝑟 (𝑃 < 0.01)
used to see if a collision occurs, but the simulation starts at Circle algorithm 18 0.381
𝑡0 + TTCbigcir . Values between 𝑡0 and 𝑡0 + TTCbigcir can be Rectangle algorithm 32 0.522
ignored. Ellipse-rectangle
45 0.732
One important issue is the determination of the geomet- algorithm
ric dimensions. The size of the ellipse is the same as was Optimized algorithm 17 0.732
discussed previously. Optimized algorithm
36 0.732
The radius of the big circle should be greater than or only using big circle
equal to the sum of the major semiaxis of subject ellipse and Optimized algorithm
48 0.732
only using small circle
the semidiagonal length of the rectangle. This is because the
function of the big circle algorithm is to find those vehicle
pairs which have no chance of colliding. The radius of the
Comparisons were drawn among the aforementioned
small circle should be the same length of the smallest axis of
algorithms, a process using big circle and ellipse-rectangle
the ellipse or rectangle.
without small circle (numerical simulation starting from
TTCbigcir ) and a process using small circle and ellipse-
5. Numerical Example and Comparison rectangle only (dichotomy search between 𝑡0 + TTCbigcir
and 𝑡0 + TTCsmacir ). Two indicators were compared among
A computational procedure was developed in MATLAB all those algorithms. First is the computation time and the
which implemented the analysis procedure shown in second is the correlation coefficient between inverse TTC
Figure 7. The efficiency of the procedure was tested and the and reaction intensity which is measured by the deceleration
results are presented in this section. The procedure can be vector and steering angle change. The optimized algorithm
applied in an environment which treats lateral movements using both small and big circles is the most efficient algo-
as continuous in space. The buffer areas are represented by rithm. And the last 4 algorithms in Table 2 have the same TTC
ellipses. If there is a need to use the rectangle to substitute the result (since the TTC values are all determined by the ellipse-
subject vehicle then in the algorithm process, for example, rectangle model). The correlation coefficient of those is larger
to obtain the exact TTC as a conflict intensity indicator, than the first 2 as the ellipse-rectangle model is more reliable
the ellipse-rectangle algorithm is replaced by the rectangle than the circle model and the rectangle model. It could be
algorithm. asserted that the algorithm using both small and big circles is
the best one.
As can be seen, the optimized algorithm provides the
5.1. Data Process. The data we used to validate the simulation
shortest computation time. Such an algorithm could also be
system as well as this algorithm is the dataset of vehicle trajec-
applied to traffic accident monitoring or safety analysis in
tory data completed as part of the Federal Highway Admin-
which the ellipse-rectangle representing geometry might be
istration’s (FHWA) Next Generation Simulation (NGSIM).
replaced by the rectangle with the same dimensions of the
The data analyzed in this paper represent vehicle trajectories
vehicle. There are still several problems to be solved as the
on a segment of U.S. Highway 101 (Hollywood Freeway)
exact parameters of the ellipse and the specific relationship
in Los Angeles, California, collected between 7:50 a.m. and
between TTC and response acceleration stimulated by it.
8:05 a.m. on June 15, 2005. The NGSIM trajectory dataset
Future work should be done to explore the importance of and
provides longitudinal and lateral positional information for
to quantify the consequence of TTC.
all vehicles in certain spatiotemporal regions. We applied
a symmetric exponential moving average filter (sEMA) to
smooth the data for all trajectories before any further analysis. 6. Conclusions
After that, velocity and acceleration values were decomposed
The optimized algorithm is proposed to calculate TTC in
into vectors combining 𝑥-axis and 𝑦-axis components.
simulation model of freeway traffic. The efficiency has been
proved sufficient for the simulation. It could also be applied
5.2. Test and Results Comparison. The tests were performed in other traffic conditions when the shape of vehicle could not
on a standard desktop computer using MATLAB (R2012a). be neglected. In the future, the TTC got from this algorithm
We set the upper bound on the TTC as 5 seconds. A should be tested and validated in the context of the entire
total of 327616 vehicle pairs were tested. Several comparison traffic simulation.
experiments were conducted using the same dataset. Some of
the results were selected at random to test the correctness of Conflict of Interests
the result. For example, the vehicle trajectories were plotted to
ensure that the TTCs correctly reflected what would happen The authors declare that there is no conflict of interests
to the vehicles given their trajectories. regarding the publication of this paper.
8 Computational Intelligence and Neuroscience

References
[1] J. C. Hayward, “Near-miss determination through use of a scale
of danger,” Highway Research Record, no. 384, pp. 24–34, 1972.
[2] C. Hydén, The Development of a Method for Traffic Safety Evalu-
ation: The Swedish Traffic Conflicts Technique, vol. 70 of Bulletin
(University of Lund, Lund Institute of Technology, Department of
Traffic Planning and Engeneering), 1987.
[3] H. W. Kruysse, “The subjective evaluation of traffic conflicts
based on an internal concept of dangerousness,” Accident
Analysis and Prevention, vol. 23, no. 1, pp. 53–65, 1991.
[4] G. Tiwari, D. Mohan, and J. Fazio, “Conflict analysis for predic-
tion of fatal crash locations in mixed traffic streams,” in Annual
Proceedings of the Association for the Advancement of Automo-
tive Medicine, Association for the Advancement of Automotive
Medicine, 1995.
[5] D. Gettman and L. Head, “Surrogate safety measures from traffic
simulation models,” Transportation Research Record, no. 1, pp.
104–115, 1840.
[6] L. Pu and R. Joshi, Surrogate Safety Assessment Model (SSAM):
Software User Manual, 2008.
[7] R. Horst, Time-to-Collision as a Cue for Decision-Making in
Braking, Vision in Vehicles—III, 1991.
[8] R. J. Kiefer, D. J. Leblanc, and C. A. Flannagan, “Developing an
inverse time-to-collision crash alert timing approach based on
drivers’ last-second braking and steering judgments,” Accident
Analysis and Prevention, vol. 37, no. 2, pp. 295–303, 2005.
[9] K. Vogel, “A comparison of headway and time to collision as
safety indicators,” Accident Analysis and Prevention, vol. 35, no.
3, pp. 427–433, 2003.
[10] M. M. Minderhoud and P. H. L. Bovy, “Extended time-to-
collision measures for road traffic safety assessment,” Accident
Analysis and Prevention, vol. 33, no. 1, pp. 89–97, 2001.
[11] A. Laureshyn, Å. Svensson, and C. Hydén, “Evaluation of
traffic safety, based on micro-level behavioural data: theoretical
framework and first implementation,” Accident Analysis and
Prevention, vol. 42, no. 6, pp. 1637–1646, 2010.
Advances in Journal of
Industrial Engineering
Multimedia
Applied
Computational
Intelligence and Soft
Computing
The Scientific International Journal of
Distributed
Hindawi Publishing Corporation
World Journal
Hindawi Publishing Corporation
Sensor Networks
Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014

Advances in

Fuzzy
Systems
Modelling &
Simulation
in Engineering
Hindawi Publishing Corporation
Hindawi Publishing Corporation Volume 2014 http://www.hindawi.com Volume 2014
http://www.hindawi.com

Submit your manuscripts at


Journal of
http://www.hindawi.com
Computer Networks
and Communications Advances in
Artificial
Intelligence
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014

International Journal of Advances in


Biomedical Imaging Artificial
Neural Systems

International Journal of
Advances in Computer Games Advances in
Computer Engineering Technology Software Engineering
Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014

International Journal of
Reconfigurable
Computing

Advances in Computational Journal of


Journal of Human-Computer Intelligence and Electrical and Computer
Robotics
Hindawi Publishing Corporation
Interaction
Hindawi Publishing Corporation
Neuroscience
Hindawi Publishing Corporation Hindawi Publishing Corporation
Engineering
Hindawi Publishing Corporation
http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014 http://www.hindawi.com Volume 2014

You might also like